SlideShare a Scribd company logo
Commercial Mobility Device (CMD)Way Forward mark.norton@osd.mil 703-607-0711 1 DoD Mobility TEM July 18 , 2011, Mitre Unclassified:  https://www.intelink.gov/sites/mobile SIPR: https://www.intelink.sgov.gov/sites/mobile JWICS:  https://www.intelink.ic.gov/sites/mobile
The Future is Mobility Go Forth & B Mobile - No Really Go … 2
GIG Transport Services Tiers WGS Commercial  SATCOM 3
Mobile Device Strategy 4 Mobile  Strategy (Draft) Goals: 1. Evolve the infrastructure to support mobile devices 	 2. Establish a common mobile application environment 3. Enable mobile device security and  information assurance  https://www.intelink.gov/sites/mobile
Core Policy Issues: Emphasizing Security, Spectrum, and App Management 5 Security ,[object Object]
Data-in-Transit
Two-factor Authentication
Mobile Device ManagementApplication Management  ,[object Object]
Data Interfacing across services/networks
Applications/system functionality
System operationSpectrum  ,[object Object]
Commercial Coexistence commercial
TRANSEC
Anti-Jam,[object Object]
Data Protection
Access Control
DoD Public Key Infrastructure (PKI) Credentials

More Related Content

What's hot

Usb Wp Implementing Usb
Usb Wp Implementing UsbUsb Wp Implementing Usb
Usb Wp Implementing Usb
allankliu
 
Ioterop @DigiWorldAwards2017
Ioterop @DigiWorldAwards2017Ioterop @DigiWorldAwards2017
Ioterop @DigiWorldAwards2017
IDATE DigiWorld
 
CIRED 2011 Presentation Smart Grid communications
CIRED 2011 Presentation Smart Grid communicationsCIRED 2011 Presentation Smart Grid communications
CIRED 2011 Presentation Smart Grid communications
Wim D'Hondt
 
NATEG Days - Machine To Machine Communication
NATEG Days - Machine To Machine CommunicationNATEG Days - Machine To Machine Communication
NATEG Days - Machine To Machine Communication
Rachik Abidi
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROI
Dan Mårtensson
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
xKinAnx
 
Telecommunication Systems IR presentation 25-06-1015
Telecommunication Systems IR presentation 25-06-1015Telecommunication Systems IR presentation 25-06-1015
Telecommunication Systems IR presentation 25-06-1015
Ludovic Privat
 
Towards Intent-driven and Cognitive Network Operations
Towards Intent-driven and Cognitive Network OperationsTowards Intent-driven and Cognitive Network Operations
Towards Intent-driven and Cognitive Network Operations
Laurent Ciavaglia
 
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
ijngnjournal
 
Open Source Possibilities for 5G Edge Computing Deployment
Open Source Possibilities for 5G Edge Computing DeploymentOpen Source Possibilities for 5G Edge Computing Deployment
Open Source Possibilities for 5G Edge Computing Deployment
Ignacio Verona
 

What's hot (10)

Usb Wp Implementing Usb
Usb Wp Implementing UsbUsb Wp Implementing Usb
Usb Wp Implementing Usb
 
Ioterop @DigiWorldAwards2017
Ioterop @DigiWorldAwards2017Ioterop @DigiWorldAwards2017
Ioterop @DigiWorldAwards2017
 
CIRED 2011 Presentation Smart Grid communications
CIRED 2011 Presentation Smart Grid communicationsCIRED 2011 Presentation Smart Grid communications
CIRED 2011 Presentation Smart Grid communications
 
NATEG Days - Machine To Machine Communication
NATEG Days - Machine To Machine CommunicationNATEG Days - Machine To Machine Communication
NATEG Days - Machine To Machine Communication
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROI
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Telecommunication Systems IR presentation 25-06-1015
Telecommunication Systems IR presentation 25-06-1015Telecommunication Systems IR presentation 25-06-1015
Telecommunication Systems IR presentation 25-06-1015
 
Towards Intent-driven and Cognitive Network Operations
Towards Intent-driven and Cognitive Network OperationsTowards Intent-driven and Cognitive Network Operations
Towards Intent-driven and Cognitive Network Operations
 
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
 
Open Source Possibilities for 5G Edge Computing Deployment
Open Source Possibilities for 5G Edge Computing DeploymentOpen Source Possibilities for 5G Edge Computing Deployment
Open Source Possibilities for 5G Edge Computing Deployment
 

Similar to Dmg tem2011-0718-02 norton cmd disa mitre overview - v9

Ian Smith - Mobile Software Testing - Facing Future Challenges
Ian Smith -  Mobile Software Testing - Facing Future ChallengesIan Smith -  Mobile Software Testing - Facing Future Challenges
Ian Smith - Mobile Software Testing - Facing Future Challenges
TEST Huddle
 
Enterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGiEnterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGi
Joachim Ritter
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
John Rhoton
 
10 dosmann -disa tem slides
10 dosmann -disa tem slides10 dosmann -disa tem slides
10 dosmann -disa tem slides
jakreile
 
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Tim Harvey
 
The Architectural Models Of UC
The Architectural Models Of UCThe Architectural Models Of UC
The Architectural Models Of UC
Ronald Gruia
 
Miami in touch-amdocs-lte-2011-05-16-handout
Miami in touch-amdocs-lte-2011-05-16-handoutMiami in touch-amdocs-lte-2011-05-16-handout
Miami in touch-amdocs-lte-2011-05-16-handout
Arthur Sanchez
 
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Tim Harvey
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
raymurphy9533
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerations
Mary McEvoy Carroll
 
SMEC ICT Business Division
SMEC ICT Business DivisionSMEC ICT Business Division
SMEC ICT Business Division
Harry Sohn
 
View Slides
View SlidesView Slides
View Slides
Videoguy
 
M2M Presentation at Telecom Council of Silicon Valley
M2M Presentation at Telecom Council of Silicon ValleyM2M Presentation at Telecom Council of Silicon Valley
M2M Presentation at Telecom Council of Silicon Valley
Daniel Kellmereit
 
Cloud Mobility SIG
Cloud Mobility SIGCloud Mobility SIG
Cloud Mobility SIG
ALessio Patatìn
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
Marco Lisi
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
Iaetsd Iaetsd
 
Industry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptxIndustry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptx
SahanaMk2
 
Independent LTE networks for major resources projects
Independent LTE networks for major resources projectsIndependent LTE networks for major resources projects
Independent LTE networks for major resources projects
Comms Connect
 
Srivaishnavi Sivagnanam_resume_final - CA_new
Srivaishnavi Sivagnanam_resume_final - CA_newSrivaishnavi Sivagnanam_resume_final - CA_new
Srivaishnavi Sivagnanam_resume_final - CA_new
srivaishnavi sivagnanam
 
HH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devicesHH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devices
Satya Harish
 

Similar to Dmg tem2011-0718-02 norton cmd disa mitre overview - v9 (20)

Ian Smith - Mobile Software Testing - Facing Future Challenges
Ian Smith -  Mobile Software Testing - Facing Future ChallengesIan Smith -  Mobile Software Testing - Facing Future Challenges
Ian Smith - Mobile Software Testing - Facing Future Challenges
 
Enterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGiEnterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGi
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
10 dosmann -disa tem slides
10 dosmann -disa tem slides10 dosmann -disa tem slides
10 dosmann -disa tem slides
 
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
 
The Architectural Models Of UC
The Architectural Models Of UCThe Architectural Models Of UC
The Architectural Models Of UC
 
Miami in touch-amdocs-lte-2011-05-16-handout
Miami in touch-amdocs-lte-2011-05-16-handoutMiami in touch-amdocs-lte-2011-05-16-handout
Miami in touch-amdocs-lte-2011-05-16-handout
 
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerations
 
SMEC ICT Business Division
SMEC ICT Business DivisionSMEC ICT Business Division
SMEC ICT Business Division
 
View Slides
View SlidesView Slides
View Slides
 
M2M Presentation at Telecom Council of Silicon Valley
M2M Presentation at Telecom Council of Silicon ValleyM2M Presentation at Telecom Council of Silicon Valley
M2M Presentation at Telecom Council of Silicon Valley
 
Cloud Mobility SIG
Cloud Mobility SIGCloud Mobility SIG
Cloud Mobility SIG
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
Industry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptxIndustry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptx
 
Independent LTE networks for major resources projects
Independent LTE networks for major resources projectsIndependent LTE networks for major resources projects
Independent LTE networks for major resources projects
 
Srivaishnavi Sivagnanam_resume_final - CA_new
Srivaishnavi Sivagnanam_resume_final - CA_newSrivaishnavi Sivagnanam_resume_final - CA_new
Srivaishnavi Sivagnanam_resume_final - CA_new
 
HH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devicesHH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devices
 

Recently uploaded

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

Dmg tem2011-0718-02 norton cmd disa mitre overview - v9

  • 1. Commercial Mobility Device (CMD)Way Forward mark.norton@osd.mil 703-607-0711 1 DoD Mobility TEM July 18 , 2011, Mitre Unclassified: https://www.intelink.gov/sites/mobile SIPR: https://www.intelink.sgov.gov/sites/mobile JWICS:  https://www.intelink.ic.gov/sites/mobile
  • 2. The Future is Mobility Go Forth & B Mobile - No Really Go … 2
  • 3. GIG Transport Services Tiers WGS Commercial SATCOM 3
  • 4. Mobile Device Strategy 4 Mobile Strategy (Draft) Goals: 1. Evolve the infrastructure to support mobile devices 2. Establish a common mobile application environment 3. Enable mobile device security and information assurance https://www.intelink.gov/sites/mobile
  • 5.
  • 8.
  • 9. Data Interfacing across services/networks
  • 11.
  • 14.
  • 17. DoD Public Key Infrastructure (PKI) Credentials
  • 20.
  • 21. CMD Security Overview ‘Tactical support’ users will require unique hardware, spectrum, infrastructure, and networking requirements 8
  • 22. CMD /Operating System Security Matrix Blackberry provides security advantage but offers limited user features Alternate approaches provide greater capability with reduced security New products such as Dell Streak may provide a balance of security and performance + + + - - - + Low Security Risk Medium Security Risk High Security Risk 9
  • 23. DoD LTE Security Goals and Commercial Standard Vulnerabilities LTE Security Goals Commercial Standard Vulnerabilities
  • 24.
  • 25. The security associated with the signaling exchange
  • 26. Spectrum of cellular assignments
  • 28. Identity and assured user accessBTS structures can be housed on mobile platforms and placed on secure sites, but environmental obstructions force extensive solutions Ownership of the BTS and MSC can offer solutions to signaling and the introduction of unwanted software Offsetting the spectrum offers a means to resolve the license issues Embedded COMSEC and potential token solutions can be employed 11 While solutions exist for cellular implementations – the offered solution set falls short
  • 29. 12 Military Applications of CMDs (Selected Examples) Multiple vendors/Mil R&D developing CMDs for edge applications Each vendor approaches CMD networking by leveraging different components of commercial architectures (i.e. operating system, closed cell based networks, commercial waveforms, etc) Systems offer performance features of commercial networks and are exploring ways to mitigate security risks
  • 30. To be determined…… Dual Persona Data Delivery Diversity (Local WLAN vs3G/4G) Services of the future: CMD Voice over IP, etc Technology Wildcards Super Wi-Fi Contactless payments – near field communications Application Management – Metrics, Common Operating Environment 13
  • 31. Way Forward New product evaluations Update Policy Re-examine security posture Common Operating Environment for CMD Applications Business case analysis Life cycle management 14
  • 32. Federal Mobility Summit 15 Sponsors: Fed CIO Council/ISIMC/DoD/DoJ/Federal Business Council Date/Time: 23-24 Aug /0800-1600 Location: UMUC, Auditorium/Conference Center, College Park MD Max Attendees: 750 (USG Primarily-No Rank Requirements) Focus: 6 Main DoD Mobility Issues Mentioned in TT's Memo/6 Apr 11 & Approximately 25 other Issues from the Rest of .gov POA/Outcome: 1. Provide the Major Players with Our Issues B4 the Summit vs. Presentation of their Wares/Sell Products 2. Get their buy-in and/or assistance to work with us in fixing the big problems we have vs. piecemeal solutions. C3PO – Collaborate, Communicate, Connect & Produce Outcomes
  • 33. CMD Policy Development Topics The following lists provide the criteria definition of minimum acceptable CMDs, OSs, and Applications 16
  • 34. CMD Policy Development Topics (Cont’d) 17